Technology is Not a Substitute for Good Business Processes | Microbyte

Technology is Not a Substitute for Good Business Processes

robot touches human hand

With all the readily available news, it’s important that we never advocate spreading undue concerns or raising anxiety with no justification. But, given the unprecedented rise in hacking and phishing attempts globally in 2018, we feel compelled to draw as much attention as possible to good business practices.

Many of you will have received emails prompting you to click links, sign in here and send money, etc., and you are no doubt always vigilant. However, people will continue to get “caught out” and these risks will increase over the coming months/years.

As an IT company, from a technology perspective we are continuously improving our offerings, and doing what we can to keep our networks secure. Multi-factor Authentication and Identity Protection Services are just two examples which are available and we are of course actively encouraging uptake of these.

As important as the technology, however, are the processes which govern their use (or should). It’s vitally important we all work regularly on our own internal processes to control the flow of data within our businesses.

How can I spot these bad practices?

Some very specific examples where we have seen (what we would perceive as) a lack of validation and controls might be:

  • In-depth phone conversations (and email) with individuals imitating genuine employees, suppliers or customers
  • Large payments made to bank accounts without enough verification as to the destination
  • Attempts to change to details held on record pertaining to individuals working for a company
  • Very few checks in place prior to agreeing to change bank account details and sending funds elsewhere
  • No multiple signoffs for large BACS payments, either verbal or written

These are just some examples where we need to evaluate, with surgical precision, who is allowed to do what within our businesses, where our liabilities lie, and how we double and triple check absolutely anything which potentially has a big risk attached.

As an example of progress, banks are stepping up efforts to provide more secure platforms and verification which is evident all around us. However there will never be enough, and the battle against fraudsters will be eternal. The fact you can still send funds to anywhere, with nothing more than a few numbers, and not even a company name that matches speaks volumes.

The time will come when we will be unable to blame the systems for not protecting us, and more good old-fashioned checklists might just have to make a comeback.

 

 

 

 

 

 

Similar blogs

Benefits of Outsourcing IT Support

Benefits of Outsourcing IT Support

Many businesses discover that developing and managing an in-house IT team is challenging. Issues such as scalability, effective delegation of IT tasks, and focusing on core activities prove problematic. At this point, managers begin to seriously consider the benefits of outsourcing to a third-party service provider. Using a managed IT services provider for support services,…

Read More

Avatar photo

What is IT Compliance

What is IT Compliance?

IT compliance is the regulatory framework for companies relating to their information technology. Specifically, compliance regulations ensure businesses follow best practices to safeguard customer data and improve information security. Regulatory requirements differ depending on country, industry, and other factors. Businesses in the UK must comply with UK, EU, US, and other laws, regulations, and standards….

Read More

Avatar photo

A Guide To MSP Compliance

A Guide To MSP Compliance

Compliance and governance elevate data security, effective controls, and regulatory observance for managed service providers (MSPs). Strike a balance between operational execution and overemphasising compliance; otherwise, you will create unwanted bottlenecks and stifle innovation. On the other hand, overlooking regulatory requirements leaves a firm open to security risks and substantial financial penalties. Companies should consider…

Read More

Avatar photo

What is Microsoft Azure and Its Benefits

What is Microsoft Azure and Its Benefits?

Microsoft responded to the emergence of cloud computing services by launching Microsoft Azure in 2010. Azure provides a cloud environment, on-premises, hybrid, and cloud situated, for app creation and management, virtualisation, data storage, web and mobile apps, and more. Services designed for the hybrid cloud let businesses use virtual machines at a distance, access databases,…

Read More

Avatar photo

Benefits of Sage X3

Benefits of Sage X3

Sage X3 (formerly Sage ERP X3) is an advanced, enterprise-level solution to manage business operations. The browser-based, cloud-ready tool helps manage finance, accounting, stock purchasing, inventory, supply chain, and manufacturing needs. Offered in a modular fashion, user subscriptions provide access to only the collection of capabilities required. Data is safeguarded when installed as an on-premises…

Read More

Avatar photo